| Vuln ID | Summary | CVSS Severity |
|---|---|---|
| CVE-2013-3893 |
Use-after-free vulnerability in the SetMouseCapture implementation in mshtml.dll in Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code via crafted JavaScript strings, as demonstrated by use of an ms-help: URL that triggers loading of hxds.dll. Published: September 18, 2013; 6:08:24 AM -0400 |
V3.x:(not available) V2.0: 9.3 HIGH |
| CVE-2013-3205 |
Microsoft Internet Explorer 6 through 8 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability." Published: September 11, 2013; 10:03:48 AM -0400 |
V3.x:(not available) V2.0: 9.3 HIGH |
| CVE-2013-3199 |
Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability." Published: August 14, 2013; 7:10:36 AM -0400 |
V3.x:(not available) V2.0: 9.3 HIGH |
| CVE-2013-3192 |
Cross-site scripting (XSS) vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to inject arbitrary web script or HTML via crafted character sequences with EUC-JP encoding, aka "EUC-JP Character Encoding Vulnerability." Published: August 14, 2013; 7:10:36 AM -0400 |
V3.x:(not available) V2.0: 4.3 MEDIUM |
| CVE-2013-4015 |
Microsoft Internet Explorer 6 through 10 allows local users to bypass the elevation policy check in the (1) Protected Mode or (2) Enhanced Protected Mode protection mechanism, and consequently gain privileges, by leveraging the ability to execute sandboxed code. Published: July 26, 2013; 8:05:40 AM -0400 |
V3.x:(not available) V2.0: 6.9 MEDIUM |
| CVE-2013-3166 |
Cross-site scripting (XSS) vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to inject arbitrary web script or HTML via vectors involving incorrect auto-selection of the Shift JIS encoding, leading to cross-domain scrolling events, aka "Shift JIS Character Encoding Vulnerability," a different vulnerability than CVE-2013-0015. Published: July 09, 2013; 11:46:10 PM -0400 |
V3.x:(not available) V2.0: 4.3 MEDIUM |
| CVE-2013-3153 |
Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3148. Published: July 09, 2013; 11:46:10 PM -0400 |
V3.x:(not available) V2.0: 9.3 HIGH |
| CVE-2013-3148 |
Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3153. Published: July 09, 2013; 11:46:10 PM -0400 |
V3.x:(not available) V2.0: 9.3 HIGH |
| CVE-2013-3147 |
Microsoft Internet Explorer 6 through 9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability." Published: July 09, 2013; 11:46:10 PM -0400 |
V3.x:(not available) V2.0: 9.3 HIGH |
| CVE-2013-3649 |
Cross-site scripting (XSS) vulnerability in KENT-WEB CLIP-MAIL before 3.4, when Internet Explorer 7 or earlier is used, allows remote attackers to inject arbitrary web script or HTML via an unspecified form field. Published: June 28, 2013; 7:55:08 PM -0400 |
V3.x:(not available) V2.0: 4.3 MEDIUM |
| CVE-2013-3648 |
Cross-site scripting (XSS) vulnerability in KENT-WEB POST-MAIL before 6.7, when Internet Explorer 7 or earlier is used, allows remote attackers to inject arbitrary web script or HTML via an unspecified form field. Published: June 28, 2013; 7:55:07 PM -0400 |
V3.x:(not available) V2.0: 4.3 MEDIUM |
| CVE-2013-3142 |
Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3112, CVE-2013-3113, CVE-2013-3121, and CVE-2013-3139. Published: June 11, 2013; 11:30:15 PM -0400 |
V3.x:(not available) V2.0: 9.3 HIGH |
| CVE-2013-3139 |
Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3112, CVE-2013-3113, CVE-2013-3121, and CVE-2013-3142. Published: June 11, 2013; 11:30:15 PM -0400 |
V3.x:(not available) V2.0: 9.3 HIGH |
| CVE-2013-3121 |
Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3112, CVE-2013-3113, CVE-2013-3139, and CVE-2013-3142. Published: June 11, 2013; 11:30:00 PM -0400 |
V3.x:(not available) V2.0: 9.3 HIGH |
| CVE-2013-3113 |
Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3112, CVE-2013-3121, CVE-2013-3139, and CVE-2013-3142. Published: June 11, 2013; 11:29:59 PM -0400 |
V3.x:(not available) V2.0: 9.3 HIGH |
| CVE-2013-3112 |
Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3113, CVE-2013-3121, CVE-2013-3139, and CVE-2013-3142. Published: June 11, 2013; 11:29:59 PM -0400 |
V3.x:(not available) V2.0: 9.3 HIGH |
| CVE-2013-1310 |
Use-after-free vulnerability in Microsoft Internet Explorer 6 and 7 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability." Published: May 14, 2013; 11:36:34 PM -0400 |
V3.x:(not available) V2.0: 9.3 HIGH |
| CVE-2013-1309 |
Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability," a different vulnerability than CVE-2013-1308 and CVE-2013-2551. Published: May 14, 2013; 11:36:34 PM -0400 |
V3.x:(not available) V2.0: 9.3 HIGH |
| CVE-2013-1308 |
Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability," a different vulnerability than CVE-2013-1309 and CVE-2013-2551. Published: May 14, 2013; 11:36:34 PM -0400 |
V3.x:(not available) V2.0: 9.3 HIGH |
| CVE-2013-1297 |
Microsoft Internet Explorer 6 through 8 does not properly restrict data access by VBScript, which allows remote attackers to perform cross-domain reading of JSON files via a crafted web site, aka "JSON Array Information Disclosure Vulnerability." Published: May 14, 2013; 11:36:33 PM -0400 |
V3.x:(not available) V2.0: 4.3 MEDIUM |